IP ADDRESS SHUFFLING USING MOVING TARGET DEFENSE (MTD)

نویسندگان

چکیده

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

MTD CBITS: Moving Target Defense for Cloud-Based IT Systems

The static nature of current IT systems gives attackers the extremely valuable advantage of time, as adversaries can take their time and plan attacks at their leisure. Although cloud infrastructures have increased the automation options for managing IT systems, the introduction of Moving Target Defense (MTD) techniques at the entire IT system level is still very challenging. The core idea of MT...

متن کامل

Defense against DDoS Attacks Using IP Address Spoofing

Distributed Denial of Service (DDoS) attacks is launched by large number of compromised host to interrupt the services of the legitimate users. It is most challenging to defense against such attacks because most of the attacker use source IP address spoofing in order to hide their identity and such attack packets appear to the target server as if they came from a legitimate client. In this pape...

متن کامل

Moving Target Defense for Web Applications using Bayesian Stackelberg Games

Vulnerabilities in web applications allow hackers to access and/or modify restricted data. Here the hackers have the opportunity to perform reconnaissance so as to gain knowledge about the web application layout before launching an attack, whereas the defender (administrator of the web application) must secure the application even with its potential vulnerabilities. In order to mask such vulner...

متن کامل

From an IP Address to a Street Address: Using Wireless Signals to Locate a Target

How quickly can somebody convert an IP address of a target into a real-word street address? Law enforcement regularly has need to determine a suspect’s exact location when investigating crimes on the Internet. They first use geolocation software and databases to determine the suspect’s rough location. Recent research has been able to scope a targeted IP address to within a 690m (0.43 mile) radi...

متن کامل

DDoS Attack Defense against Source IP Address Spoofing Attacks

Distributed Denial of Service (DDoS) attacks is the most challenging problems for network security. The attacker uses large number of compromised hosts to launch attack on victim. Various DDoS defense mechanisms aim at detecting and preventing the attack traffic. Source IP address spoofing is one of the most common ways of launching Distributed Denial of Service attacks. In these types of attac...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: International Journal of Research in Engineering and Technology

سال: 2016

ISSN: 2321-7308,2319-1163

DOI: 10.15623/ijret.2016.0511004